咨询与建议

限定检索结果

文献类型

  • 2,011 篇 会议
  • 500 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,601 篇 工学
    • 982 篇 计算机科学与技术...
    • 825 篇 软件工程
    • 335 篇 信息与通信工程
    • 284 篇 控制科学与工程
    • 224 篇 电气工程
    • 223 篇 电子科学与技术(可...
    • 144 篇 仪器科学与技术
    • 137 篇 生物医学工程(可授...
    • 134 篇 生物工程
    • 125 篇 光学工程
    • 101 篇 机械工程
    • 93 篇 动力工程及工程热...
    • 82 篇 化学工程与技术
    • 69 篇 建筑学
    • 63 篇 航空宇航科学与技...
    • 60 篇 材料科学与工程(可...
  • 910 篇 理学
    • 477 篇 数学
    • 282 篇 物理学
    • 159 篇 生物学
    • 136 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 104 篇 化学
    • 85 篇 地球物理学
  • 394 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 166 篇 工商管理
    • 140 篇 图书情报与档案管...
  • 128 篇 医学
    • 112 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 65 篇 药学(可授医学、理...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 60 篇 法学
  • 40 篇 教育学
  • 24 篇 农学
  • 6 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 62 篇 accuracy
  • 45 篇 training
  • 44 篇 optimization
  • 43 篇 computational mo...
  • 35 篇 feature extracti...
  • 33 篇 predictive model...
  • 32 篇 computer archite...
  • 32 篇 software
  • 32 篇 artificial intel...
  • 31 篇 neural networks
  • 30 篇 machine learning
  • 29 篇 internet of thin...
  • 26 篇 costs
  • 25 篇 servers
  • 24 篇 support vector m...
  • 24 篇 hardware
  • 24 篇 estimation
  • 23 篇 computer science
  • 23 篇 neutrons
  • 23 篇 real-time system...

机构

  • 89 篇 infn sezione di ...
  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 87 篇 infn sezione di ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 85 篇 infn sezione di ...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 80 篇 university moham...
  • 80 篇 università la sa...
  • 79 篇 western sydney u...
  • 76 篇 infn sezione di ...
  • 73 篇 università di sa...
  • 70 篇 university of am...
  • 69 篇 tbilisi state un...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 93 篇 brunner j.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 91 篇 di palma i.
  • 90 篇 coniglione r.
  • 89 篇 calvo d.
  • 89 篇 eberl t.
  • 87 篇 bendahman m.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 83 篇 gozzini s.r.
  • 83 篇 dallier r.
  • 83 篇 carretero v.

语言

  • 2,287 篇 英文
  • 222 篇 其他
  • 25 篇 日文
  • 17 篇 中文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Systems Architecture and Technology"
2553 条 记 录,以下是251-260 订阅
排序:
Secure and Efficient Key Management for Deduplicated Cloud Storage systems
Secure and Efficient Key Management for Deduplicated Cloud S...
收藏 引用
Security of Information and Networks (SIN), International Conference on
作者: Jay Dave Anshul Kanodia Raj Srivastava Kushagra Singh Prithvi Hegde Hitaishi Desai Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India
Deduplication is a ubiquitous compression technique for cloud storage servers. It reduces storage and bandwidth requirements by avoiding duplicate copies of data. However, developing an encryption scheme for deduplica...
来源: 评论
Ensuring Electronic Health Record (EHR) Privacy using Zero Knowledge Proofs (ZKP) and Secure Encryption Schemes on Blockchain
Ensuring Electronic Health Record (EHR) Privacy using Zero K...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Ranaweera T.A.V.Y Hewage H.N.H Hapuhinna H.K.D.W.M.C.B. Preethilal K.L.K.T Amila Senarathne Laneesha Ruggahakotuwa Dept. Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
In the haste of EHR digitization, the protection of patient data becomes paramount, casting a spotlight on small healthcare clinics grappling with the threats of an ever more interconnected healthcare sector. That is ...
来源: 评论
Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things
Secure Deduplication with Dynamic Key Management in Fog Enab...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Jay Dave Nikumani Choudhury Utkarsh Tiwari Samyu Kamtam Kudapa Sai Rohith Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India
Fog computing is an extension of cloud computing and presents additional devices called fog devices near IoT devices providing services on behalf of cloud servers. Although fog computing brings several advantages, rap...
来源: 评论
Knowledge Graph Generation for Unstructured Data Using Data Processing Pipeline
Knowledge Graph Generation for Unstructured Data Using Data ...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Sushmi Thushara Sukumar Chung-Horng Lung Marzia Zaman Dept. of Systems and Computer Eng. Carleton University R&D Cistel Technology
The proliferation of technologies and unstructured data on the internet poses a persistent challenge in extracting valuable information from diverse formats. To address this, research leverages Machine Learning (ML) a...
来源: 评论
Auto Disturbance Rejection Control Based on A Neural Network Predictive State Observer
Auto Disturbance Rejection Control Based on A Neural Network...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shengzhi Du BJ van Wyk NFS Nahri Chunling Tu Dept. Electrical Engineering Tshwane University of Technology Pretoria South Africa Dept. Computer Systems Engineering Tshwane University of Technology Pretoria South Africa
This paper addresses the auto disturbance rejection control (ADRC) for systems with time delay. ADRC is an effective control for most linear or nonlinear systems with noises and disturbances, because of its advantage ...
来源: 评论
Automated Boundary Identification for Machine Learning Classifiers
Automated Boundary Identification for Machine Learning Class...
收藏 引用
Search-Based and Fuzz Testing (SBFT), IEEE/ACM International Workshop on
作者: Felix Dobslaw Robert Feldt Dept. of Quality Mngmt Communication and Inf. Systems Mid Sweden University Östersund Sweden Dept. of Computer Science and Engineering Chalmers University of Technology Gothenburg Sweden
AI and Machine Learning (ML) models are increasingly used as (critical) components in software systems, even safety-critical ones. This puts new demands on the degree to which we need to test them and requires new and... 详细信息
来源: 评论
Does Sri Lanka Have a Good Maritime Strategy to Stop Cyber-Terrorist Attacks
Does Sri Lanka Have a Good Maritime Strategy to Stop Cyber-T...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Samaraweera S. A. R. P Siriwardana S. M. D. N W. D. V. Fernando D. N. Rajakarunaratne Dept. of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Maritime cyber-terrorist attacks have become a major concern to the entire world in recent decades. Everyone should be more aware of marine strategies to prevent cyberterrorist attacks, both locally and globally. This...
来源: 评论
An Optimal Optimization of Software Development Cost Estimation Using Genetic Algorithm
An Optimal Optimization of Software Development Cost Estimat...
收藏 引用
Sciences and Techniques of Automatic Control and computer Engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Mabroukah Amarif Salha Owaydat dept. of Information Systems Faculty of Information Technology Sebha University of Libya Sebha Libya dept. of Computer Sciences Faculty of Sciences Sebha University of Libya Sebha Libya
Estimating effort allows managers and software engineers to accurately anticipate, forecast, and quote schedule, budget, and manpower requirements. Determining estimated project cost, duration, and maintenance efforts... 详细信息
来源: 评论
A CNN and Image-Based Approach for Malware Analysis
A CNN and Image-Based Approach for Malware Analysis
收藏 引用
2022 International Conference on Emerging Trends in Computing and Engineering Applications, ETCEA 2022
作者: Migdady, Aya Smadi, Lara Yaseen, Qussai Jordan University of Science and Technology Dept. of Computer Information Systems Irbid22110 Jordan Ajman University CEIT College AIRC Center United Arab Emirates
Malware attacks have various types, patterns, and volumes and have become more sophisticated and severe. Using machine learning to classify and detect malware is one of the approaches to mitigate malware attacks. Howe... 详细信息
来源: 评论
VascularVision: Mixed Reality Based Teaching and Learning Environment for Cardiovascular Conditions
VascularVision: Mixed Reality Based Teaching and Learning En...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Hashith Nissanka Sajini Wijayasundara Jude Rajarathne Sahan Vidanagamage Didula Thanaweera Arachchi Pradeep K. W. Abeygunawardhana Dept. Information Technology Sri Lanka Insitute of Information Technology Kandy Sri Lanka Dept. Information Technology Sri Lanka Insitute of Information Technology Colombo Sri Lanka Dept. Information Technology Sri Lanka Insitute of Information Technology Malabe Sri Lanka Dept. Computer Systems Engineering Sri Lanka Insitute of Information Technology Malabe Sri Lanka
Developments in Augmented Reality (AR) and Virtual Reality (VR) have the potential to revolutionize medical education, especially in the areas of Coronary Angiography and Cardiac Auscultation. By giving medical and nu... 详细信息
来源: 评论